SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
SESSION	ID:
MODERATOR:
PANELISTS:
SESSION	ID:
#RSAC
CSV-W11
Cory	Scott
Chief	Information	Security	Officer
LinkedIn
Bill	Burns
Chief	Trust	Officer	and	VP,	Business	Transformation;	Informatica
Cloud	Security	Assessments:	You're	
Doing	It	Wrong!
Trey	Ford
Head	of	Trust
Heroku,	a	SalesForce company
Jim	Trovato
Sr.	Director,	IT	Governance	Risk	and	
Compliance;	Informatica
#RSAC
2
#RSAC
Today
3
Digital	Transformations	are	creating	high-velocity	businesses
Managing	vendor	risk	isn’t	keeping	up
Service	Provider	perspective	– manual	process,	no	standards
Customer	perspective	– hard	to	compare,	assess	vendors
Discussion:	What	can	our	industry	do	to	address	risk	at	scale	and	serve	
our	businesses	better?
But	first,	some	examples	of	what	customers	send	…
#RSAC
4
Example:	“Dashboard	of	requirements”
#RSAC
5
Example:	“Tabs,	tabs,	tabs!”
#RSAC
6
Example:	“Complex,	multiple	choice”
#RSAC
7
Example:	“Document	Requests	à Remediation	Plans”
#RSAC
8
Example:	“Essay	Questions”
#RSAC
9
Example:	“Maturity	Model	Assessments	+	Essays”
#RSAC
Discussion	– How	can	we	serve	
our	businesses	better?
#RSAC
11
#RSAC
How	to	apply	what	we	shared	… (1	of	2)
12
Link	to	the	video	recording	of	this	RSA	session:
https://www.rsaconference.com/videos/cloud-security-assessments-youre-doing-it-wrong
Providers
Just	getting	started:	Build	a	corpus	of	Q	&	A	to	help	you	respond	faster	to	majority	of	questions
Review	standardized	third-party	reports	to	determine	overlap	with	yours
Adopt	and	reply	with	a	standardized	report	format	to	address	~80%	of	customers’	questions.	
(CSA	CAIQ,	BITS	SIG,	etc)
Customers
Pick	a	standard	assessment	format,	trim	down	to	the	essentials/critical	items	for	your	needs
— Send	cloud-specific	security	questionnaires	for	cloud-relevant	vendors
Accept	standardized	reports	like	CAIQ,	SIG	for	common	controls	to	streamline	processing
— Submit	smaller	customer	questionnaires	for	controls	unique	to	your	risk	model
If	you	request	SOC2	reports,	make	sure	to	read	the	entire	report
— Are	the	controls	you	care	included	and	covered?
— Do	all	control	gaps	have	an	associated	Management	Action	Plan?
#RSAC
How	to	apply	what	we	shared	… (2	of	2)
13
Customers	(continued)
Talk	to	your	Legal	team,	what	liability	would	YOU	incur	by	directly	auditing	providers?
Consider	focusing	your	questionnaire	on	risk,	security,	compliance.	Avoid	kitchen-sink	
coverage.
Getting	confidence	in	a	provider’s	risk	level.	Look	for:
— A	good	semantic	classification	and	understanding	of	the	data	and	functionality	that	you	are	
entrusting	to	them.
¡ You	can	get	that	in	a	good	whitepaper	or	a	talk	with	their	security	team
— How	thoughtful	they’ve	implemented	the	following	key	controls:	Authentication	/	
Authorization,	Access	Control,	Auditing	/	Logging
— Signs	of	a	strong	application	security	program:
¡ An	assessment	by	a	reputable	firm	with	a	thought	out	methodology
¡ A	responsible	disclosure	page,	bug	bounty	programs
¡ Open	source	community	participation
¡ Good	people	work	there
#RSAC
Resources	- assessments
14
First-party	assessments
Lengthy,	bespoke	“kitchen	sink”	questionnaires	(please	don’t!)
BITS	Shared	Assessments’	SIG	and	SIG-lite	questionnaires	(circa	2006)
HIPAA/HITECH	self-assessment
CSA	STAR	Level	1	(circa	2013),	Common	Controls	Matrix	(CCM)	and	Consensus	Assessments	Initiative	
Questionnaire
Third-party	assessments
PCI-DSS	Report	On	Compliance	(“ROC”)
ISO27000
BITS	Shared	Assessments	AUP
HITRUST	audit,	HIPAA/HITECH	attestation
CSA	STAR	(Levels	2,	3)
AICPA	SSAE	16	/	SOC	1,	SOC	2,	SOC	3
— SOC2+	(SOC	2	plus	HIPAA,	HITRUST,	PCI,	ISO27k,	COBIT	5,	NIST	800-53R4,	CSA-CCM)

Mais conteúdo relacionado

Semelhante a Cloud security assessments : You're doing it wrong!

Darius Vaskelis - Future Trends in Customer IT Beyond CRM
Darius Vaskelis - Future Trends in Customer IT Beyond CRMDarius Vaskelis - Future Trends in Customer IT Beyond CRM
Darius Vaskelis - Future Trends in Customer IT Beyond CRMEfim Aldoukhov
 
Introduction and a Look at Security Trends
Introduction and a Look at Security TrendsIntroduction and a Look at Security Trends
Introduction and a Look at Security TrendsPriyanka Aash
 
CI or FS Poly Cleared Job Fair Handbook | February 10
CI or FS Poly Cleared Job Fair Handbook | February 10CI or FS Poly Cleared Job Fair Handbook | February 10
CI or FS Poly Cleared Job Fair Handbook | February 10ClearedJobs.Net
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
Metamorphosis of the Digital CPA
Metamorphosis of the Digital CPA Metamorphosis of the Digital CPA
Metamorphosis of the Digital CPA CPA.com
 
Cyber Maryland Job Fair Job Seeker Handbook Oct 11, 2017, Baltimore, Maryland
Cyber Maryland Job Fair Job Seeker Handbook Oct 11, 2017, Baltimore, MarylandCyber Maryland Job Fair Job Seeker Handbook Oct 11, 2017, Baltimore, Maryland
Cyber Maryland Job Fair Job Seeker Handbook Oct 11, 2017, Baltimore, MarylandClearedJobs.Net
 
Cloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialCloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialVMware Tanzu
 
CI or FS Poly-Only Cleared Job Fair Job Seeker Handbook Sept 15, 2016, BWI, MD
CI or FS Poly-Only Cleared Job Fair Job Seeker Handbook Sept 15, 2016, BWI, MDCI or FS Poly-Only Cleared Job Fair Job Seeker Handbook Sept 15, 2016, BWI, MD
CI or FS Poly-Only Cleared Job Fair Job Seeker Handbook Sept 15, 2016, BWI, MDClearedJobs.Net
 
Di in the age of digital disruptions v1.0
Di in the age of digital disruptions v1.0Di in the age of digital disruptions v1.0
Di in the age of digital disruptions v1.0Amar Roy
 
Implementa procesos de calidad de datos para obtener visibilidad de 360 grado...
Implementa procesos de calidad de datos para obtener visibilidad de 360 grado...Implementa procesos de calidad de datos para obtener visibilidad de 360 grado...
Implementa procesos de calidad de datos para obtener visibilidad de 360 grado...Solvis Consulting, LLC
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentationwebhostingguy
 
The Value Of Business Information March 2010
The Value Of Business Information   March 2010The Value Of Business Information   March 2010
The Value Of Business Information March 2010GarySmith2000
 
The Right Data Warehouse: Automation Now, Business Value Thereafter
The Right Data Warehouse: Automation Now, Business Value ThereafterThe Right Data Warehouse: Automation Now, Business Value Thereafter
The Right Data Warehouse: Automation Now, Business Value ThereafterInside Analysis
 
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer DirectoryreStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer DirectoryKen Fuller
 
Lessons and Challenges from Mining Retail E-Commerce Data
Lessons and Challenges from Mining Retail E-Commerce DataLessons and Challenges from Mining Retail E-Commerce Data
Lessons and Challenges from Mining Retail E-Commerce DataKun Le
 
Becoming an Enterprise SaaS Company | DecisionDesk @ TechPint
Becoming an Enterprise SaaS Company | DecisionDesk @ TechPintBecoming an Enterprise SaaS Company | DecisionDesk @ TechPint
Becoming an Enterprise SaaS Company | DecisionDesk @ TechPintJohn Knific
 
Cleared Job Fair Job Seeker Handbook Feb 6, 2020, Tysons Corner, VA
Cleared Job Fair Job Seeker Handbook Feb 6, 2020, Tysons Corner, VACleared Job Fair Job Seeker Handbook Feb 6, 2020, Tysons Corner, VA
Cleared Job Fair Job Seeker Handbook Feb 6, 2020, Tysons Corner, VAClearedJobs.Net
 
Why IT needs more IT Architects (IASA style)
Why IT needs more IT Architects (IASA style)Why IT needs more IT Architects (IASA style)
Why IT needs more IT Architects (IASA style)Paddy Baxter
 

Semelhante a Cloud security assessments : You're doing it wrong! (20)

Darius Vaskelis - Future Trends in Customer IT Beyond CRM
Darius Vaskelis - Future Trends in Customer IT Beyond CRMDarius Vaskelis - Future Trends in Customer IT Beyond CRM
Darius Vaskelis - Future Trends in Customer IT Beyond CRM
 
A105_Vaskelis
A105_VaskelisA105_Vaskelis
A105_Vaskelis
 
Introduction and a Look at Security Trends
Introduction and a Look at Security TrendsIntroduction and a Look at Security Trends
Introduction and a Look at Security Trends
 
CI or FS Poly Cleared Job Fair Handbook | February 10
CI or FS Poly Cleared Job Fair Handbook | February 10CI or FS Poly Cleared Job Fair Handbook | February 10
CI or FS Poly Cleared Job Fair Handbook | February 10
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Metamorphosis of the Digital CPA
Metamorphosis of the Digital CPA Metamorphosis of the Digital CPA
Metamorphosis of the Digital CPA
 
Cyber Maryland Job Fair Job Seeker Handbook Oct 11, 2017, Baltimore, Maryland
Cyber Maryland Job Fair Job Seeker Handbook Oct 11, 2017, Baltimore, MarylandCyber Maryland Job Fair Job Seeker Handbook Oct 11, 2017, Baltimore, Maryland
Cyber Maryland Job Fair Job Seeker Handbook Oct 11, 2017, Baltimore, Maryland
 
Cloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialCloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony Financial
 
CI or FS Poly-Only Cleared Job Fair Job Seeker Handbook Sept 15, 2016, BWI, MD
CI or FS Poly-Only Cleared Job Fair Job Seeker Handbook Sept 15, 2016, BWI, MDCI or FS Poly-Only Cleared Job Fair Job Seeker Handbook Sept 15, 2016, BWI, MD
CI or FS Poly-Only Cleared Job Fair Job Seeker Handbook Sept 15, 2016, BWI, MD
 
Di in the age of digital disruptions v1.0
Di in the age of digital disruptions v1.0Di in the age of digital disruptions v1.0
Di in the age of digital disruptions v1.0
 
Implementa procesos de calidad de datos para obtener visibilidad de 360 grado...
Implementa procesos de calidad de datos para obtener visibilidad de 360 grado...Implementa procesos de calidad de datos para obtener visibilidad de 360 grado...
Implementa procesos de calidad de datos para obtener visibilidad de 360 grado...
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
The Value Of Business Information March 2010
The Value Of Business Information   March 2010The Value Of Business Information   March 2010
The Value Of Business Information March 2010
 
The Right Data Warehouse: Automation Now, Business Value Thereafter
The Right Data Warehouse: Automation Now, Business Value ThereafterThe Right Data Warehouse: Automation Now, Business Value Thereafter
The Right Data Warehouse: Automation Now, Business Value Thereafter
 
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer DirectoryreStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
reStartEvents April 22nd DC metro Cleared Virtual Career Fair Employer Directory
 
Lessons and Challenges from Mining Retail E-Commerce Data
Lessons and Challenges from Mining Retail E-Commerce DataLessons and Challenges from Mining Retail E-Commerce Data
Lessons and Challenges from Mining Retail E-Commerce Data
 
Becoming an Enterprise SaaS Company | DecisionDesk @ TechPint
Becoming an Enterprise SaaS Company | DecisionDesk @ TechPintBecoming an Enterprise SaaS Company | DecisionDesk @ TechPint
Becoming an Enterprise SaaS Company | DecisionDesk @ TechPint
 
Cleared Job Fair Job Seeker Handbook Feb 6, 2020, Tysons Corner, VA
Cleared Job Fair Job Seeker Handbook Feb 6, 2020, Tysons Corner, VACleared Job Fair Job Seeker Handbook Feb 6, 2020, Tysons Corner, VA
Cleared Job Fair Job Seeker Handbook Feb 6, 2020, Tysons Corner, VA
 
Why IT needs more IT Architects (IASA style)
Why IT needs more IT Architects (IASA style)Why IT needs more IT Architects (IASA style)
Why IT needs more IT Architects (IASA style)
 

Mais de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Mais de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Cloud security assessments : You're doing it wrong!